Remove Analysis Remove CTO Hire Remove Information Security
article thumbnail

Case in point: taking stock of the CrowdStrike outages

CIO Business Intelligence

It was an interesting case study of global cyber impact, says Charles Clancy, CTO at Mitre. What happened In CrowdStrikes own root cause analysis, the cybersecurity companys Falcon system deploys a sensor to user machines to monitor potential dangers. But then what endpoint detection and response platform should you use instead?

CTO Hire 292
article thumbnail

Invincea Announces 54 New Enterprise Customers for Its Flagship Enterprise Solution, $8.1M in Advanced Research Contracts for Its Labs Division

CTOvision

in Advanced Research Contracts For its Labs Division. In the first quarter of 2014, the company’s advanced research division—Invincea Labs—secured $8.1M contract with the U.S. A security strategy that only reacts to attacks isn’t acceptable,” said Paul Calatayud, Chief Information Security Officer of Surescripts. “To

CTO Hire 255
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Scale and Speed with Cyber Security

CTOvision

The number one organizing principle has to be speed and its speed operating at every level within an enterprise: from how software gets built to how it gets deployed to how it evolves to how fast HR can fire and hire people, the speed of light infects everything, it has to be optimized for.

Security 271
article thumbnail

10 projects top of mind for IT leaders today

CIO Business Intelligence

Data analysis CIOs aren’t only finding themselves more involved in securing data; they’re also increasing attention on making sure their organization’s data is ready to use for analytics, with 54% of CIOs anticipating greater emphasis on data analysis in the year ahead, according to the State of the CIO survey. “It

Survey 355
article thumbnail

8 data strategy mistakes to avoid

CIO Business Intelligence

Similar to disaster recovery, business continuity, and information security, data strategy needs to be well thought out and defined to inform the rest, while providing a foundation from which to build a strong business.” Overlooking these data resources is a big mistake. It will not be something they can ignore.

Strategy 340
article thumbnail

MACH37: America’s premier market-centric cybersecurity accelerator

CTOvision

” Rick Gordon, a leader in the cybersecurity industry, was hired in July as the Managing Partner of MACH37™. This new generation of technology increases the ability of Chief Information Security Officer’s to train, exercise, test, model and simulate through on demand replication of cyber infrastructure.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

Right when the Napster movement, anti Napster pro Napster movement was going on, named him says he went and defaced a bunch of websites and, and that was one of the first cases I was hired from, you know, a corporate corporation that had been defaced asking if I could analyze, you know what happened there. That was really fun.